Beruflich Dokumente
Kultur Dokumente
Information
and
Communication
Technology
(ICT)
Chapter 1
Chapter 2
: Computer Systems
Chapter 3
Chapter 4
: Multimedia
Chapter 5
: Programming
Chapter 6
: Information Systems
28
NOTES
27
6 positive impacts :
Faster communication speed
Lower communication cost
Reliable mode of communication
Effective sharing of information
Paperless environment
NOTES
Borderless communication
5. Intellectual
Property
protection
26
9. Data
manipulation
Insert to add new records in the file when new data are obtained.
2 common methods:
User identification show passport, key-in user name & password,
show exam slip
Processed object swipe security card to enter building, police check
the drivers license to identify valid driver
8. Controversial
content
9. Internet
filtering
3 common methods :
Keyword blocking uses a list of banned words to filter access to the
site
Website / site blocking uses software to prevent access to any
sites on the list
Web rating system browser gain access to a certain level of ratings
25
Primary key these keys must not be null values, and it is unique. It
helps to avoid duplication
Foreign key the field that matches the primary key in another table.
It may have duplicate values.
Telemedicine Act 1997 Ensure only qualified medical practitioners can practice telemedicine
8. Phases of
System
Development
Analysis Phase
Developers will perform problem analysis by finding out the needs of
target users.
Developers also identify the input, process and output for the new
system.
Design Phase
Based on the needs of target users, the system developers will design
an Entity Relationship Diagram (ERD)
Implementation Phase
Developers create database using database software.
Testing Phase
The system will be tested by the target users in the Testing Phase If
there is any error detected; the system developers will fix the error.
Documentation Phase
Developers will produce the documents for the program
12. Computer
Security
3 types of maintenance:
Corrective maintenance to repair error in the system design.
Software and Data Security used to protect software and the loss
of data files
24
Malicious code
Virus a program that can pass in the malicious code to
other programs by modifying them
Trojan Horse a program which can perform useful and
unexpected action
Logic Bomb that goes off when a specific condition
occurs
Trapdoor or Backdoor a program that allows someone
to access the program with privileges
Worm a program that copies and spreads itself
through a network
4.
Hierarchy of
Data
Benefits of
using database
Data can be shared allow ease of sharing data especially over the
network.
Features of
Table stores a collection of information about specific topic.
table, query,
form and report Query request for a specific data from a database
Form interface to enter information.
Report summary of information from the database.
23
1.
computer system.
Definition
Data raw material that are not organized, and has little value
Information processed data that are organized, meaningful and
useful.
2.
Component of
IS
15. Security
Procedures
People individuals who use the hardware, software and its output
Procedures the set of instructions indicating the entire above
component in order to process information and generate the
expected outcome.
3.
Types of IS
Data Protection
Backup files
Detect virus and do cleanup
Warn others on virus attack
Detecting illegal access to systems
Tcpwrappers control access at the application level
rather than at socket level.
Tripwire detect and report on any changes in the
thousands of strategic system files.
Preventing illegal access to system
Preventing illegal access to root
Patch small updates to software
22
6. Control
Structure
1. Computer
System
2. Computer
Hardware
Input
Process
Output
Storage
5. Machine cycle
diagram
Fetch
Store
7. Program
development
phase
Decode
Documentation phase the process of written description and
pseudo code of computer programs.
Execute
21
Basic
element
6. Data
representation
Variables value may change at any time during the course of a program
Data type
Integer: whole number (18, 79, 101, -6, -20)
Double: Numbers with decimal or contains fractional part (14.1, - 3.5,
200.10)
String: value that contains a sequence of characters (Ahmad,
sekolah)
Boolean: consist either True or False value
Currency: For currency use (RM, USD, Yen)
Operators symbol or notation that tells a computer to perform certain
actions or operation
Mathematical operators: plus (+), minus (), multiply (*), divide (/)
Relation operators: equal to (=), greater than (>), less than (<),
greater than or equal to (>=), less than or equal to (<=)
Logical operators: AND, OR, NOT
5.
Flow line and arrowhead shows connect symbols and indicate the
sequences of operation.
Terminator
Input/output
Process
Decision
20
User Interface
Chapter 5 : Programming
1.
3.
Translator
10
19
Screen Design
how the multimedia program will look when it is displayed on the
computer screen.
1.
Computer
Network
Contrast
the usage of different types of multimedia elements
Alignment
the arrangement of multimedia elements on the screen. For example,
graphics or text should be arranged at the most suitable position
2.
Network
Architecture
Simplicity
the simple and easy way of presenting the multimedia program
3.
Proximity
the concept of grouping a similar or related element
Network
Topology
Emphasis
to creating the focus point on the screen
Repetition
repeating the same texture, colour, size of font and style in the
multimedia program.
Node
Node
Node
Node
Node
Node
HUB
Node
18
Node
11
Network
Standard
7. Multimedia
production
team
Project Manager
Define the scope of the project and discuss with the client
Search for financial resources, equipment and facilities
Coordinate the production team
Subject Matter Expert
Do the research on the content of a multimedia program
Provide content for the multimedia content
802.11 Wireless LAN : communication between a wireless computer or client, uses 2.4 GHz frequency to transmit data up to 2
Mbps
5.
Protocols
Audio-Video Technician
Record voice, capture, edit and digitize the video
Instructional Designer
Decide on the best educational strategies and practices to
present the information.
Programmer
Write the program code lines or scripts using the authoring tool
6.
Network
Communication
Technologies
7.
Transmission
medium
8. Multimedia
Production
Phases
Analysis developers interview the clients to find out their needs and
write the problem statement and a proposal.
Design developer design a flow chart and storyboard
Implementation developers convert a design plan such as storyboard into a multimedia project
Testing to ensure the program runs correctly without errors.
Evaluation focuses on overall presentation and effectiveness of the
multimedia.
Publishing package the presentation/project multimedia
using suitable software
12
17
Chapter 4 : Multimedia
6. User Interface
Principle
1. Definition of
Multimedia
2. Interactivity
CD-based
Can store high end multimedia elements
Information permanently stored and are not changeable
Information can be outdated
4. Multimedia
Elements and File
formats
Navigation user can move around the menu, help files or other
screens
Search enables user to search keywords or glossary
Personalisation user can make their own personal or individual
learning
Learnability system provides support information and help files to
make system easy to understand
File Format
Text
Graphic
Animation
Audio
Video
Flexibility user has the authority to navigate through all the sections
16
13
6 Authoring Tool
Concept
Icon
Multimedia elements are organized in a structural framework
Users can present visually a logical flow of events by dragging
icons from an icon menu
Example : Authorware, IconAuthor
Graphic
Animation
Audio
Video
14
15